- All languages
- Assembly
- Awk
- Batchfile
- Bicep
- BitBake
- Brainfuck
- C
- C#
- C++
- CSS
- Dockerfile
- Erlang
- F#
- Go
- Groovy
- HCL
- HTML
- Java
- JavaScript
- Jinja
- Jsonnet
- Jupyter Notebook
- Lua
- MATLAB
- Makefile
- Markdown
- Nginx
- Nix
- OCaml
- Objective-C++
- PHP
- Perl
- PowerShell
- Python
- Ruby
- Rust
- SCSS
- SaltStack
- Scala
- Shell
- Smarty
- Starlark
- Swift
- TSQL
- Tcl
- TeX
- Terra
- TypeScript
- Vim Script
- Vue
- XSLT
- YARA
- Zeek
Starred repositories
A comprehensive cheat sheet for using urlscan.io in bug bounty hunting, including advanced search queries, regex filters, and tips for analyzing domains, IPs, URLs, and more.
Various tips & tricks
Fast and configurable TLS grabber focused on TLS based data collection.
The source code for the OpenRelik public website
A collection of samples for development and testing of John the Ripper and other password security auditing and password recovery tools
Web browser forensics for Google Chrome/Chromium
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
Synopsis is a tool to aid analysts reviewing browser history files by providing a high-level “synopsis” of key information.
CuckooML: Machine Learning for Cuckoo Sandbox
Linux, Jenkins, AWS, SRE, Prometheus, Docker, Python, Ansible, Git, Kubernetes, Terraform, OpenStack, SQL, NoSQL, Azure, GCP, DNS, Elastic, Network, Virtualization. DevOps Interview Questions
Active Directory pentesting mind map
That's what this repo is all about!
Fast subdomains enumeration tool for penetration testers
This repo is about Active Directory Advanced Threat Hunting
21 Lessons, Get Started Building with Generative AI 🔗 https://microsoft.github.io/generative-ai-for-beginners/
Build projects required for DSC (Desired State Configuration)
Documentation for PowerShell Desired State Configuration
PowerShell Desired State Configuration - for Linux
Central repository for PowerShell Desired State Configuration (DSC) resources.
This repository contains complete resources and coding practices for malware development using Rust 🦀.
Regshot is a small, free and open-source registry compare utility that allows you to quickly take a snapshot of your registry and then compare it with a second one - done after doing system changes…
Vulnerable server used for learning software exploitation
Windows Local Privilege Escalation Cookbook
Simple (relatively) things allowing you to dig a bit deeper than usual.
A Packer template for creating a Fortinet FortiGate Vagrant box for the libvirt provider.